Michael Meyer

CRO | CISO | CIO | Innovator | Speaker | Author | Forbes Technology Council

Cherry Hill, NJ


Office Hours

How does this work?

Visionary leader recognized for developing, deploying, and directing enterprise risk management, information security, privacy solutions, and digital initiatives that are aligned with client and business needs. Strong innovative talents generate new technology solutions internally and with external partner teams. Innovative team efforts and achievements have resulted in three case studies (IBM, AWS, ORCA). Architects advanced integration of enterprise technology, digital communications, risk assessment, and security controls for the proper balance of risk and fraud reduction, total transparency, and revenue optimization. Responsible for regulatory initiatives, their implementation, and directly interfacing with client and Government audit personnel. Demonstrated executive expertise in corporate Governance, Risk, and Compliance (GRC). Develops and implements enterprise-wide solutions with strategic capabilities that prevent and mitigate risks while protecting Fortune 500 organizations and major Financial, FinTech, Automotive, Telecom, Medical, and Utility companies. Holds 9 Security, Privacy, and Risk Certifications and has been a member of 10 industry or corporate steering committees, has multiple published articles, and enjoys speaking at conferences. Advanced security knowledge across PCI, SOC 2, ISO, NIST/FISMA, SIG, and CAIQ domains. Specialties: Architecting Enterprise Information Security and Privacy solutions. Digital Transformation, Innovative Fintech and API Technologies, Payments, Enterprise Data Analytics, Enterprise Risk Mitigation (ERM), Virtual Agents, Amazon Web Services (AWS), IBM Watson, Research and development, Project and Program Management, Policy Development, Incident Response Management (IRM), Identity Access Management (IAM), Information Security Officer, Security and Internal Audits, Control Self Assessments (CSA), Vendor Management, Business Continuity Planning, Network, and Telecom Architecture, Machine Learning, Global Call and Data Centers, Product Creation and Team Building.

Ask me about
Cyber Security
Enterprise Risk
Information Security
Cloud Security
Payment Processing
Orca Security
Work experience

Jul 2020 - Present

Pace University - Seidenberg School of Computer Science and Information Systems

Advisory Board Member - Cyber Security

Pace University and the Seidenberg School have been committed to cybersecurity education and research for over 10 years. We have established collaborations with faculty at academic institutions locally, regionally, nationally, and internationally, and with professionals in the cybersecurity space in private and public sectors. As we continue to strengthen our cybersecurity programs and prepare to address the needs of our students and the industry in the future, we strive to achieve sustainable and high-impact success. To that end, we established a cybersecurity advisory group of industry leaders and experts to provide programmatic guidance in several areas, including curriculum, co-curricular activities, research, and outreach. The group meets semi-annually (fall/spring).


Jul 2019 - Present


Chief Risk Officer (CRO) and Chief Innovation Officer (CIO)

Shape and secure the future by reimagining what is possible to totally transform the secure enterprise today using advanced technologies including AI. Drive acceleration of our Governance, Risk, and Compliance (GRC) through innovative emerging technologies, embedded security, enhanced privacy protections, and cross-functional team collaboration. Partner with various business units to align security strategy with business vision and roadmaps. Designs, develops and implements the security and compliance program’s risk control framework and technology risk strategy. Ensures the GRC program is effectively integrated into design, development, and service delivery methodology. Responsible for Cyber Security and end-to-end security along with enterprise architecture of applications, technologies, and services. Managed over 60 annual PCI/DSS (Level 1), SOC II Type II, ISO-27001, SIG, information / physical security, cloud, fraud, and privacy audits. Created and aligned policies, procedures, and processes to meet or exceed audit requirements in all offices.


Nov 2018 - Present

Forbes Technology Council

Official Member

Forbes Technology Council Is An Invitation-Only Organization For Senior-Level Technology Executives. Members are respected tech leaders and executives — CEOs, CIOs, CTOs, and others — selected for the council based on their deep knowledge and diverse experience in the industry.


Mar 2018 - Aug 2019

Rutgers University

Advisory Board Member - Cyber Security

The Cybersecurity Program at Rutgers University's Center for Innovation Education is designed to train and develop professionals to manage cybersecurity issues within an organization. It provides participants with the insight and expertise needed to solve real-world cybersecurity problems, recommends practical and strategic solutions, and to communicate results. Participants gain technical, analytical, and communication skills through Rutgers' project-based interdisciplinary curriculum, which seeks to provide a comprehensive understanding of the new cybersecurity threats and players. Founded nearly 250 years ago, Rutgers University-New Brunswick is a nationally-ranked public university with 18 degree-granting schools. A distinguished center for teaching and research located in the heart of the tri-state region. ​Rutgers educates over 40,000 students per year and is among the top 25 public universities, as ranked by U.S. News & World Report


Aug 2013 - Jun 2019


Chief Risk Officer (CRO) and Chief Security Officer (CSO)

Leads enterprise risk management and security teams to ensure that management and the stakeholders are engaged with the company’s key strategic risks, including compliance, operations, data, and security to protect MRS and Client brands. Directs the identification and mitigation of internal, external and industry risks for the company, including reviewing internal controls. Implemented enterprise-wide governance and drove cultural changes. Integrates the risk management program with data strategies and provides advice to the executives and leaders on necessary architecture, strategy and policy changes. Defines organizational risk appetite and works with outside counsel to ensure compliance. Establishes and promotes a “risk aware” culture among MRS employees. Oversees all internal and external vendor audits and risk assessments by audit staff. Manages and reviews all documentation related to risk assessments and audits of standard operating policy, procedures, and processes. Architects, implements, and manages the enterprise risk process to reduce operational and organizational risks. Analyze, measure, and communicate complex risks to stakeholders, including executive management and department directors. Designs, develops, and implements the security and program’s risk control framework and technology risk strategy. Ensures the program is effectively integrated into software development and service delivery methodology. Responsible for Cyber Security and the end-to-end security and data architecture of applications, technologies, and services. Managed over 50 annual PCI/DSS (Level 1), SOC II Type II, ISO-27001, information / physical security, cloud, fraud, and privacy audits. Created and aligned policy, procedure, and process architectures to meet or exceed audit requirements in all offices. Audits ranged from one day to eight weeks, and from one to eight on-site auditors. Primary contact for Government examiners during reviews, audits, and exams.


Nov 2006 - Jul 2013


Chief Information Officer (CIO) and Chief Security Officer (CSO)

Direct all aspects of IT and Security, developing short and long-range strategies to enhance business operations by architecting secure information processing and communications. Hire, supervise and coordinate staff as well as external vendors, suppliers and consultants. Evaluate existing and planned infrastructures/systems to determine security requirement levels and identify areas for improvement or upgrades. Established, maintained and enforced policies, procedures and guidelines for IT, security, network vulnerability, video surveillance, incident response, privacy, disaster recovery, business continuity, asset protection and emergency situations. Knowledgeable in audit, fraud identification and forensic techniques. Collaborate with internal and external stakeholders from Senior Management, Client Audit Teams, QA, HR, Legal and Law Enforcement to create, implement, maintain and enforce our security policies to enhance our security posture. Managed over 40 annual PCI/DSS (Level 1), ISO-27001/2, GLBA and HIPAA, information security, physical security and privacy audits along with architecting solutions, implementing policies and changing processes that ensured passage of every client and external security audit in all offices, including an international location. These audits ranged from one day to one week with one or more on-site auditors. Partner with leadership team and stakeholders to identify, develop, implement and support emerging IT and Security technologies for all aspects of the organization, our clients and their customers. Manage internal and external client escalations. Develop roadmaps, KPI’s and KRI’s, lead internal and client related IT improvement, integration and security implementation projects. Chair IT/Security Steering Committee. Collaborate with strategic vendor partners (information providers to telecom companies) in order to create unique new innovations or enhanced product or service offerings for multiple vertical markets.


Nov 1999 - Oct 2006


Chief Information Officer (CIO)

Established and directed the strategic and tactical goals, policies, and procedures for the information technology department. Provided technological guidance, supervised information systems, security and communications networks. Designed, developed, and maintained platforms and network infrastructure for local and wide area connectivity. Architected foundation for data analysis platforms. Managed the day-to-day operations of the information technology department, directed staff in networking, software development, user services and telecommunications. Presented new approaches, along with assessing and anticipating technology shifts. Recommended appropriate actions and resource allocations. Helped company grow and expand into multiple US and international locations. Built, moved and opened call centers along with a new corporate headquarters due to rapid growth.

Nov 1989 - Oct 1999

CompSultants, Inc.

Founder / President

Founded a system integration, networking and software consulting company servicing clients in Financial (Banking, Credit Card), Insurance (Life), Manufacturing (ERP), Apparel / Fashion (ERP), Specialty Food (Retail and Manufacture), Healthcare, Legal and Architecture. Directed corporate operations and supervised employees in designing and building various types of systems, networks, databases and applications for clients. Provided services to more than 400 companies and mainly serviced and supported clients with midsize to large IBM AIX, SUN Solaris and HP Unix systems, SQL, Oracle Databases and networks. Major Client Accomplishments: Architected, built and supported of one of the largest decision support and data analysis systems in Pennsylvania for Advanta (using Sun Solaris, SAS, and Oracle Databases) to improve marketing business intelligence and decision making operations. Installed HP OpenView for 2K+ systems for a large corporate customer and updated the environment a few years later with the latest technology. Built credit bureau simulation tool and Interface with FICO Falcon. Helped turn around and lead the HNC Capstone Project (Automated Neural Network Credit Card Decisioning) that was behind schedule and put it into production for a large credit card client. Sold business to a larger company.

Jul 1986 - Oct 1989

GE Government Services

Senior Training Developer

Developed 6 specialized training courses for the maintenance, operations and management of large classified global information systems and unique specialized data analysis equipment for military and government customers. Courses ranged from 4 to 8 weeks in length. Taught courses at multiple US. and foreign locations as an alternate instructor. Held TS/SCI clearance.

Jun 1983 - Jun 1986

RCA Government Services

Training and Installation Engineer

Taught multiple classified global strategic information and specialized data analysis systems to maintenance, operations and management personnel around the world for military and government customers. Classes ranged from 4 to 8 weeks in length. Trained over 1000 students in more than 20 countries. Assisted with installation of systems. Held TS/SCI Clearance.


Jun 1979 - May 1983

U.S. Army

Military Intelligence - Electronics Warfare Intercept Systems

Held TS/SCI clearance


2017 - 2019

Georgetown University

Masters, Technology Management

Georgetown University’s Master of Professional Studies in Technology Management prepares you to become a forward-thinking and effective technology leader. You’ll master not only the critical-thinking strategies needed to analyze and address evolving business needs, but also the management expertise that prepares you to inspire teams and drive innovation. Rooted in application, our program brings together focused coursework and practical, hands-on experience. You’ll have the opportunity to engage with some of the nation’s leading industry experts and organizations through real-world client work, guest lectures, case studies, and networking events.

Talk to Michael

@ Copyright 2020 OfficeHours Technologies Co.